frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Show HN: Delta Widgets – A widget maker for Windows using Tauri

https://delta-widgets.vercel.app/
1•amaan-mohib•16s ago•0 comments

Phoenix LiveView Colocated Hooks and JavaScript

https://elixircasts.io/liveview-colocated-hooks
1•alekx•5m ago•0 comments

RAG isn't dead, the bar has gone up

https://www.tensorlake.ai/blog/advanced-rag
1•diptanu•6m ago•0 comments

Aldus Corporation (1984)

https://it.wikipedia.org/wiki/Aldus_Corporation
1•maremmano•6m ago•0 comments

Pinned Device Memory Patches for Intel's Multi-GPU Battlematrix Linux Efforts

https://www.phoronix.com/news/Intel-Pinned-Device-Memory
1•losgehts•7m ago•0 comments

Po-Shen Loh on Building Thoughtfulness, Empathy, and Strong Networks in AI Era

https://toolong.link/v?w=xWYb7tImErI&l=en
1•androng•8m ago•0 comments

Stop Paywalling SSO: It Is a Basic Right, Not an Enterprise Perk

https://oneuptime.com/blog/post/2025-08-19-sso-is-a-security-basic-not-an-enterprise-perk/view
2•ndhandala•9m ago•0 comments

Blinking a Light with Ping at 1HZ (2017)

https://hackaday.com/2017/07/06/blinking-a-light-with-ping/
1•z-mach9•10m ago•0 comments

The Cassette Recorder That Went to the Moon

https://obsoletesony.substack.com/p/the-cassette-recorder-that-went-to
1•Michelangelo11•14m ago•0 comments

American Exceptionalism Acquisition Corp

https://www.sec.gov/ix?doc=/Archives/edgar/data/0002079173/000119312525182758/d38750ds1.htm
2•petethomas•16m ago•1 comments

Just One More Prompt

https://steipete.me/posts/just-one-more-prompt
1•jshchnz•18m ago•0 comments

"Things are a bit bumpy right now" – FreeBSD:15 pkg repo is essentially down

https://lists.freebsd.org/archives/freebsd-current/2025-August/008458.html
1•luckman212•18m ago•1 comments

Docker container for running Claude Code in "dangerously skip permissions" mode

https://github.com/tintinweb/claude-code-container
1•Luc•20m ago•1 comments

UV-light method cuts computer chip manufacturing steps in half

https://techxplore.com/news/2025-07-uv-method-chip.html
1•PaulHoule•22m ago•0 comments

Away from Capitol Hill, a Kentucky lawmaker lives off the grid

https://spectrumnews1.com/ky/louisville/news/2025/08/13/thomas-massie-home-kentucky-
2•rami•22m ago•0 comments

Built a back end service to help companies manage multiple ML models

1•DhirajSinghJr•23m ago•0 comments

Many Are Focused on the Wrong Questions When It Comes to AI

https://www.aclu.org/news/civil-liberties/many-are-focused-on-the-wrong-questions-when-it-comes-to-ai
3•stareatgoats•24m ago•3 comments

Britain's AI strategy: the risk that it is dependency dressed up in digital hype

https://www.theguardian.com/commentisfree/2025/aug/18/the-guardian-view-on-britains-ai-strategy-the-risk-is-that-it-is-dependency-dressed-up-in-digital-hype
1•drankl•25m ago•0 comments

The Hacker's Renaissance: A Manifesto Reborn

https://phrack.org/issues/72/19#article
2•_Microft•27m ago•0 comments

China's Meituan launches in Brazil, taking on iFood and Uber

https://restofworld.org/2025/meituan-brazil-launch-food-delivery/
1•colinprince•28m ago•0 comments

Misago is fully featured modern forum that is fast/scalable/responsive

https://github.com/rafalp/Misago
1•indigodaddy•28m ago•0 comments

From M1 MacBook to Arch Linux: A month-long experiment that became permanenent

https://www.ssp.sh/blog/macbook-to-arch-linux-omarchy/
8•articsputnik•29m ago•3 comments

How can England possibly be running out of water?

https://www.theguardian.com/news/ng-interactive/2025/aug/17/how-can-england-possibly-be-running-out-of-water
1•xrayarx•31m ago•0 comments

End-to-end encryption coming to iOS-Android RCS chats as soon as next month

https://www.phonearena.com/news/end-to-end-encryption-securing-ios-android-rcs-chats-could-be-weeks-away_id173353
2•mikece•33m ago•0 comments

Show HN: Wake word detection with custom phrases without model training

https://github.com/st-matskevich/local-wake
1•st-matskevich•35m ago•0 comments

OSHA: Proposed Rule to Revise Asbestos Respirators Requirements

https://www.regulations.gov/document/OSHA-2025-0024-0002
1•impish9208•36m ago•0 comments

Ask HN: Raising high level vision concerns as a junior, internal org takeover?

1•jamboca•36m ago•2 comments

Fuzzing Hardware Like Software (2021)

https://arxiv.org/abs/2102.02308
1•imakwana•38m ago•0 comments

Blobdrop: Drag and drop files directly out of the terminal

https://github.com/vimpostor/blobdrop
1•LorenDB•39m ago•1 comments

Mexico's welfare policies helped 13.4M people out of poverty

https://www.theguardian.com/world/2025/aug/18/mexico-welfare-policies-amlo
3•worik•39m ago•4 comments
Open in hackernews

The SSO Wall of Shame – Vendors that treat SSO as luxury feature

https://sso.tax/
111•vinnyglennon•1h ago

Comments

baq•53m ago
if you need SSO you have money

if you need SSO but you don’t have money, you have issues

mungoman2•50m ago
Yes, agreed. What we see is simply a clever way to differentiate the customers that can pay a premium from those that can't. The end goal is to extract the maximum amount of money.
baq•42m ago
I would call it obvious instead of clever, but otherwise fully agreed.
tptacek•32m ago
Or, equivalently, to enable the largest number of customers to use the product, by decreasing prices for smaller customers and increasing them for large ones.
mmerickel•42m ago
This is just flat-out untrue, OIDC or SAML plus SCIM should be the default for any enterprise-focused service provider or "you're doing it wrong". You can offer your own IDP as the default, but all of the problems that need to be solved to allow your customers to configure their own IDP are important to the design/architecture of your service and the only reason these providers are treating it as special is because they didn't build the integration between their service and their IDP correctly the first time. Provisioning and authentication are critical to security and you're actively harming your customers if you require them to use your own IDP solution in order to use your service.
datadrivenangel•28m ago
As a volunteer at a volunteer run non-profit, I agree! Nobody makes any more at the org, and it would be great to have SSO for things without having to pay more 150% of our total annual budget to get it...
simplyinfinity•40m ago
I self host a bunch of apps that have SSO as enterprise feature. i want to invite my family/friends into these apps, i don't wanna spend additional 20 000$ for the SSO part, but it be real sweet if i could use it. It would eliminate so much questions like "hey.. what was my login to X?" or "can you reset my password to Y" if i could just use SSO.
rawfan•33m ago
Just use oauth2-proxy with keycloak to put SSO in front of any self-hosted app.
NewJazz•28m ago
Works if everyone has the same permissions in the app but you might still need a shared login as well. I've done this for e.g. metabase before but it is not the same as a native oidc integration.
fabian2k•53m ago
Not to defend this practice, but SSO does tend to produce an additional support burden. It's complex, there are many knobs to fiddle with and it can be tedious to figure out if the customer (via configuration, or their identity provider itself) or the vendor are at fault for an issue.

Just had an issue today, I'm reasonably sure it's the customer's fault. But I also misread the spec earlier and was wrong about some parts that worked out of the box with one identity provider, but not another one. So who knows. Okay, I assume this parts gets better once your SSO implementation gets older, but it's a pain when you're starting out with it.

NegativeLatency•47m ago
Especially so if the customer is not a tech company or otherwise has IT staff that aren't uh motivated.

Add in SCIM and IT people "changing stuff to better align with our other stuff" and you just get a whole steamy barrel of fun.

mikestorrent•20m ago
God forbid the evil IT department just wants you to have the same username everywhere
9dev•39m ago
Are you working for Stripe and the issue is names not syncing via SCIM perchance? In that case I’m the customer and reasonably sure it’s your fault ;)
fabian2k•38m ago
No, it's far, far smaller and very specialized software.
stackskipton•30m ago
Yep, I used to deal with this at $LastJob and amount of support burden was terrible.

Azure AD/Entra ID (Microsoft IDP) was most common and amount of IT folks who don't have a clue about it is staggering.

Companies kicking over issues to us when it's their problem. "Hey, we have a ticket saying MFA Required but account shows as Entra ID." "Send it back with contact their IT team." "Their IT team opened the ticket" rage screaming

Companies not following setup instructions. I used to provide Terraform, Powershell and Graphical setup. I can count on one hand how many people used Terraform/Powershell. This was always dicey because I got familiar with the error messages and would be "Yep, this was not setup right on their end." I had 4 phone calls with $CustomerIT swearing it was setup properly and stopped attending after that. Finally they got someone with a brain to review and finished setup.

Documentation would fall out of date because of some UI change and I'd spend a day reviewing it and updating it.

mikestorrent•20m ago
To be fair, Entra is an abysmally bad user experience; their support barely knows anything about it. Provisioning is clunky and slow. Applications are split into two halves. Self-service password reset is a half-finished joke.

Tip of the iceberg: adding a custom field to a user record is possible, but you need to use the Graph API to do it; once you've added it, it is never visible on any UI, you can only get the data back out via API. So good luck making a custom field that your clerical staff can actually work with.

There's Terraform support to add applications to it, but you end up having to go in and click "grant admin consent"... no way to do the whole thing IaC without a bit of manual interaction. Maybe that's a good thing? Annoying anyway.

stackskipton•9m ago
>There's Terraform support to add applications to it, but you end up having to go in and click "grant admin consent"... no way to do the whole thing IaC without a bit of manual interaction. Maybe that's a good thing? Annoying anyway.

Previous customer IT support staff, is that you?

resource "azuread_service_principal_delegated_permission_grant" "grant" { service_principal_object_id = blah resource_service_principal_object_id = blah claim_values = ["openid"] }

dvrp•49m ago
in the real world you pay for extra security; yet developers think that this should be free just cuz…?
zdragnar•32m ago
... Because the specifications are open. Practically the whole Internet is built on open specifications. The security and operations benefits are obvious for enterprise customers. Startups could also benefit greatly from it, but the cost ramping of the large providers is onerous.
bee_rider•21m ago
I don’t think you should have to pay extra for extra security in general. Making a product or service free of security defects ought to be considered a basic requirement of merchantability.

But we should also draw a distinction between, like, real security defects (RCEs, that sort of thing) and features that might make it easier to deploy a system securely (SSO).

throwup238•47m ago
Some of these numbers don’t quite make sense. AppSmith has the highest percentage increase (16567%) but that’s because the minimum is 100 seats, so the actual number is $25/mo or 66% increase. How often do vendors enforce these minimums? I’ve never had a problem getting past them (at least with small to medium sized SaaS companies) when contacting sales as long as I had a few tens of users.

I really appreciate Cloudflare not putting SSO behind a paid subscription because using their Cloudflare Access product with Github SSO has been the easiest way to secure my personal services running on a VM.

arjvik•38m ago
Out of curiosity, why GitHub as the SSO provider? Am thinking about local SSO for my homelab and was debating passkeys vs tying to Google accounts.
ian-g•46m ago
I don't think it's necessarily _wrong_ to say that SSO shouldn't just be an enterprise feature, but if you need to hire an additional person or two just for SSO, you should feel free to pass that cost (plus a cushion) on.
phito•46m ago
I wanted to try using n8n in my homelab, but was very disappointed to see the SSO behind a paywall even in the community edition. Bit of a deal breaker for me unfortunately.
coldcode•46m ago
I once worked a contract at a public University, and the first thing I noticed was their SSO implementation. You logged into a single page, and then it called the other applications with a GET putting the username and password in the clear in the URL. Facepalm.
supportengineer•37m ago
I once worked at a company in the Healthcare space that acquired a small company for $10 million. When the deal closed and they showed us the Patient Portal, the first thing I noticed was no HTTPS. At all. Just plain HTTP everywhere.
robertkoss•40m ago
Its the same if you sell B2B software and have to offer SSO to your customers. Every auth provider like Auth0, Clerk, WorkOS etc. increases their prices tremendously if you require SSO...
sidewndr46•31m ago
That's why single sign on is so great, every single vendor has their own way of implementing it.
mooreds•12m ago
Disclosure, I work for FusionAuth.

heya robertkoss, FusionAuth is software you can run yourself for free which is comparable to Auth0, Clerk, WorkOS. We have a community plan with unlimited SSO providers (SAML and OIDC; sorry, we don't support WS-Fed).

Here's the doc to set up an OIDC provider to Entra ID: https://fusionauth.io/docs/lifecycle/authenticate-users/iden...

We have other things we charge for (pricing here: https://fusionauth.io/pricing?step=plan ) but we don't charge per SSO connection.

Our_Benefactors•36m ago
This page is unfortunately pure delusion.

I recall early in my career, I was building out a pilot version of a service. Early feedback was that users loved it, and it looked like the tool would be a good way to build our brand, but not a huge money maker. Cost per seat would be about $15/mo and we expected to sell less than 10 seats per customer. SSO integration would be a flat one-time fee in the mid four figures, and my boss laughed when he explained there was more money to be made integrating a mediocre service than selling a perfect solution behind a traditional username and password login.

tptacek•33m ago
This pops up on HN about once a year, and it's worth calling out that the SSO tax has mostly nothing to do with technology or with support costs and mostly everything to do with market segmentation. One of the clearest segmentation signals you get is that bigger, less price-sensitive customers all require SSO (because their SOC2 attestations require it).

You can get irritated about pricing systems that soak price-insensitive customers, but remember that the big price-insensitive customers pay for the price-sensitive customers, which is why this kind of segmentation is practically universal.

Previously, on this, from me:

https://news.ycombinator.com/item?id=29892664

ryanisnan•28m ago
Can you clarify, are you suggesting that the bills footed by large orgs that require SSO are paying the bills for these features?
0cf8612b2e1e•21m ago
I think the implication is that without a few whale customers, the minimum price would be significantly higher for everyone. The SSO whales subsidize everyone else.
bryanrasmussen•18m ago
I sort of feel that the way most software pricing works is that it is the big customers who pay for features in everything and the small customers get brought along for the ride, in short I think it's the same as SSO for basically all functionality.
trollied•21m ago
Yes, your 2 seat small business isn't paying the bills.
jaggederest•18m ago
It's true both in the micro sense ("We wouldn't have developed the headache that is SSO without a cornerstone customer demanding it and paying $XXXk"), and in the macro sense ("Our business would not be a going concern without the significant revenue provided by enterprise customers")
mikepurvis•18m ago
I expect like any industry, most SaaS operations are floated by a smaller number of whale customers, and everyone else is running a lot closer to (or at) break even in terms of cost, but serve as advertising, testing, and vendor-validation that allows that next whale to pull the trigger.
Aurornis•20m ago
> but remember that the big price-insensitive customers pay for the price-sensitive customers

The fallacy is thinking that the alternative is for everyone to pay the lower price and get the enterprise features.

In reality, without market segmentation a singular price for everyone would fall much closer to the enterprise price than the non-enterprise price.

You can call it an SSO tax, but it would be equally correct to refer to the lower price as the non-corporate discount.

zoeysmithe•14m ago
I think this is overly complimentary to big business and what's essentially predatory pricing.

The reality is you can't just carve out on feature and say "we pay for this." I mean that's true of a lot of things. The big revenue generators pay for a lot of things, but how things are billed is important. Remember, not to long ago people paid for Netscape, but now its laughable to pay for a browser. Its arbitrary to have this 'buffet' mentality and seems purposely shaming towards people who rightfully complain about ridiculous pricing structures like this.

I'm also skeptical that SSO costs vendors money. Maintaining and supporting an authentication database is a huge expense. For every SSO client, its one less Adobe or whatever account that needs to be hosted. Less helpdesk tickets about password resets, etc. SSO tends to be once and done. Hosting millions of accounts and being the sign-on provider for them is not 'once and done.'

Lastly, a lot of orgs don't do this. A lot arent SOC2. That means they'll just use whatever account the vendor supplies, and most likely without MFA, but their SSO would have provided that, thus making everyone more vulnerable. This is a great example of how exec salaries and stock buybacks and other things have priority over security because security is seen as a cost-center and without litigation or law, stuff like this becomes the norm. Oh and now there's one more source of passwords out there and another potential hack.

This is just greed and predatory. Its not the wonderful largess of big companies. It fact, its quite the opposite.

hackitup7•12m ago
Thank you for adding some sanity to this discussion – this is ultimately a matter of economics, and the R&D effort to add and maintain these features is not trivial.
cubefox•9m ago
Similar reason why there is a big price difference between DVDs and Blu-rays, and why DVDs still exist in the first place.
medlazik•8m ago
Small orgs don't need to be SOC2 to have client contracts that require SSO. This is absolute fucking evil behavior and this page shouldn't exist anymore in 2025.
mooreds•7m ago
I like Patio11's characterization[0]:

> The right way to think of the "SSO tax" (where companies charge extra for security features) is "You are being offered a dual use product backed by a strong engineering team for far less than it would otherwise cost, with sophisticated enterprises picking up the slack."

That said, TLS/SSL used to be the preserve of the enterprise too (or at least the ecommerce site).

There are lots of free options, including 3rd party servers and libraries. I'm hoping eventually SSO will be, if not in free versions, at least not isolated to enterprise plans.

0: https://x.com/patio11/status/1481293027331440640

adrr•32m ago
If I ran a saas company, i would charge more for users not use to SSO. Bigger risk storing passwords and managing login process(2FA, password reset etc).
neilv•28m ago
> Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc.

Or the IdP is administered by the enterprise's own IT operation.

The outsourcing of your security to (and also consequently leaking information to) a third party IdP is a fairly new phenomenon in 'security'.

Someone must have paid a lot of money to promote that idea.

axus•23m ago
But I really like checking my email without signing in to a VPN.
jjcm•28m ago
I agree with the sentiment in theory but disagree in practice.

The way I typically look to segment and price things is by billing based on organizational complexity rather than gating end-user features whenever possible. If something is a specific need for a large org, it should be a higher tier, since those organizations typically have a larger ability to pay. If it's something that a single seat user would want if they were an expert, I'd rather not tier on that - it basically would be shitting on your largest segment of superusers / fans / influencers for most B2C apps.

Put a different way, if I were subscribing to MS Paint, I'd rather have to pay more for SAML/SCIM provisioning than to pay for the number of particles the spray paint tool can output at once. One limits orgs, the other limits users. You should never limit users without reason.

erikerikson•26m ago
Whoever wrote this erroneously sees the entry level pricing as a viable product rather than just a part of the sales funnel for the customers that bring the bulk of buying power and revenue.
SkyPuncher•20m ago
At a past company, we had discussion about this exact topic. Despite wanting to offer SSO on a free/low-tier, we simply could not justify it.

SSO was by far our most expensive feature to support. It was the single largest bucket of support requests and a significant percentage of those requests required an engineer to get on a call with a customer (and their IT team).

We evaluated building better product/tooling to self-serve, but we realized that it likely wouldn’t solve the issue. SSO is security critical, so anytime things go wrong people throw their hands up and say “nope, I’m not the one that’s going to hurt my company”. They really just needed someone on our end to give them confidence.

Don’t get me wrong, we fixed many of the biggest issues - but there’s an endless supply of crap that can go wrong.

Aurornis•18m ago
> SSO was by far our most expensive feature to support. It was the single largest bucket of support requests and a significant percentage of those requests required an engineer to get on a call with a customer (and their IT team).

I can confirm this is how it goes.

You can theorize about how SSO should be straightforward or self-serve, but in practice the SSO feature creates a disproportionately large support and engineering burden.

When you’re dealing with SSO support for a customer buying 100 expensive seats it can be easy to justify.

When you’re debugging the SSO for some small shop with 3 licenses who will churn suddenly the moment their lead noticed a shiny new competitor, it’s not worth it.

lousken•8m ago
Sorry but that just means the feature is difficult to use on either side, so that would be at least 50% of your problem anyway. Provide good docs? How about that?

Every time someone has a problem create docs for it and after some time those questions will reduce significantly.

edit: also, for people implementing this the first time it should be obvious what happens when

1) they create a new account in your app (local)

2) if they create a new account within SSO provider

3) what happens with existing accounts during setup and if current users will be migrated over or not (or if they can use both singins)

fabian2k•5m ago
Part of the problem is that every identity provider is different. So you'd have to provide docs for every single one of them and their particularities.

And customers don't necessarily read the docs, or even if they do they don't configure everything correctly.

z3ratul163071•19m ago
thank you for this. i also found this few years back, incredibly annoying.
sirjaz•17m ago
This is just more justification to bring software back onprem and kill SaaS.
worik•10m ago
That list of firms is a wall of shame, period